From the course: Automating Data Quality in Dev Environments

Unlock this course with a free trial

Join today to access over 25,300 courses taught by industry experts.

Make a traceability matrix

Make a traceability matrix

- [Narrator] Requirements gathering for security isn't the same as gathering business requirements. Capturing security requirements is complex, comprehensive, and can take time to implement. So it's best to start security requirements gathering as early in your data product process as possible well before beginning a data migration or deploying data to production. Security requirements fall within three categories, confidentiality, controlling who gets to read information, integrity, assuring that information and programs are changed only in a specific authorized manner, and availability, assuring that authorized users have continued access to information and resources. It helps to track these security requirements using a security requirements traceability matrix. This matrix shows security requirements, their implementation schedule, and essential resources you'll need to succeed. VSRTM is a useful tool for your security steward to build and maintain as your products work…

Contents